A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none d...A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed.展开更多
A new non-linear bending-torsional coupled model for double-row planetary gear set was proposed, and planet's eccentricity error, static transmission error, and time-varying meshing stiffness were taken into consi...A new non-linear bending-torsional coupled model for double-row planetary gear set was proposed, and planet's eccentricity error, static transmission error, and time-varying meshing stiffness were taken into consideration. The solution of differential governing equation of motion is determined by applying the Fourier series method. The behaviors of dynamic load sharing characteristics affected by the system parameters including gear eccentricities error, ring gear's supporting stiffness, planet's bearing stiffness, torsional stiffness of first stage carrier and input rotation rate were investigated qualitatively and systematically, and sun gear radial orbits at first and second stage were explored as well. Some theoretical results are summarized as guidelines for further research and design of double-row planetary gear train at last.展开更多
In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedbac...In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.展开更多
The multi-string LED in parallel is a popular structure in backlight and lighting applications.The current balancing for each string is required to achieve uniform luminance and reliable operation.The conventional act...The multi-string LED in parallel is a popular structure in backlight and lighting applications.The current balancing for each string is required to achieve uniform luminance and reliable operation.The conventional active current sharing technique using a switching converter or a linear switch is very complex,and needs extra components.The conventional coupled inductor based current sharing method is much more simple,but needs too many coupled inductors.展开更多
A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one parti...A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given.展开更多
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu...Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance.展开更多
The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organ...The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.展开更多
To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this schem...To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.展开更多
A new nonlinear transverse-torsional coupled model with backlash and bearing clearance was proposed for planetary gear set. Meanwhile, sun gear and planet's eccentricity errors, static transmission error, and time...A new nonlinear transverse-torsional coupled model with backlash and bearing clearance was proposed for planetary gear set. Meanwhile, sun gear and planet's eccentricity errors, static transmission error, and time-varying meshing stiffness were taken into consideration. The differential governing equations of motion were solved by employing variable step-size Rung-Kutta numerical integration method. The behavior of dynamic load sharing characteristics affected by the system parameters including input rate, sun gear's supporting stiffness and eccentricity error, planet's eccentricity error, sun gear's bearing clearance, backlashes of sun-planet and planet-ring meshes were investigated qualitatively and systematically. Some theoretical results are summarized at last which extend the current understanding of the dynamic load sharing behavior of planet gear train, enrich the related literature and provide references for the design of planetary gear train.展开更多
The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptog...The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced.展开更多
Over the past few decades, the world has witnessed a rapid growth in mobile and wireless networks(MWNs) which significantly change human life. However, proliferating mobile demands lead to several intractable challe...Over the past few decades, the world has witnessed a rapid growth in mobile and wireless networks(MWNs) which significantly change human life. However, proliferating mobile demands lead to several intractable challenges that MWN has to face. Software-defined network is expected as a promising way for future network and has captured growing attention. Network virtualization is an essential feature in software-defined wireless network(SDWN), and it brings two new entities, physical networks and virtual networks. Accordingly, efficiently assigning spectrum resource to virtual networks is one of the fundamental problems in SDWN. Directly orienting towards the spectrum resource allocation problem, firstly, the fluctuation features of virtual network requirements in SDWN are researched, and the opportunistic spectrum sharing method is introduced to SDWN. Then, the problem is proved as NP-hardness. After that, a dynamic programming and graph theory based spectrum sharing algorithm is proposed.Simulations demonstrate that the opportunistic spectrum sharing method conspicuously improves the system performance up to around 20%–30% in SDWN, and the proposed algorithm achieves more efficient performance.展开更多
A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overco...A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overcomes the limitation of the static weighted secret sharing schemes that cannot change the weights in the process of carrying out and the deficiency of low efficiency of the ordinary dynamic weighted sharing schemes for its resending process. Thus, this scheme is more suitable to the case that the number of shareholders needs to be changed randomly during the scheme is carrying out.展开更多
A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a res...A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a resource) is used as an intermediate result and executed in other peers via its duplication and transmission. As the checkpoint is close to a final result, the reduction of execution time for each task becomes higher, leading to reducing turnaround time. To evaluate the performance of our scheduling scheme in terms of transmission cost and execution time, an analytical model with an embedded Markov chain is presented. We also conduct simulations with a failure rate of tasks and compare the performance of our scheduling scheme with that of the existing scheme based on client-server architecture. Performance results show that our scheduling scheme is superior to the existing scheme with respect to the reduction of execution time and turnaround time.展开更多
Scientific data refers to the data or data sets generated from scientific research process through observations, experiments, calculations and analyses. These data are fundamental components for developing new knowled...Scientific data refers to the data or data sets generated from scientific research process through observations, experiments, calculations and analyses. These data are fundamental components for developing new knowledge, advancing technological progress, and creating wealth. In recent years, scientific data has been attracting more and more attention for its preserving, archiving and sharing.展开更多
With the increasing globalization and international communication,numerous overseas students and visiting scholars study and exchange knowledge in Chinese universities.They confront the challenge of how to effectively...With the increasing globalization and international communication,numerous overseas students and visiting scholars study and exchange knowledge in Chinese universities.They confront the challenge of how to effectively deal with the knowledge sharing in a cross- cultural setting. The purpose of the study is to examine knowledge sharing in Chinese universities in the cross-communication setting. First,the concepts of cross-cultural communication and knowledge sharing are briefly introduced. The paper explores the internal and external factors affecting knowledge sharing in Chinese universities. The findings show the strategies of knowledge sharing that should be employed,including promoting mutual trust,establishing knowledge sharing culture,the incentive and rewards system and the ShareNet platform.展开更多
Resource sharing in the different parts of the clonal white clover plant (Trifolium repens L.) was investigated in this study. The results showed that the integration of water and nitrogen metabolism occured among par...Resource sharing in the different parts of the clonal white clover plant (Trifolium repens L.) was investigated in this study. The results showed that the integration of water and nitrogen metabolism occured among parental, young and old branches of a plant when water passed through its stolons. Under the sufficient supply of light, water and nutrients from soil the newly developed branches showed similar capacity in taking in sufficient water and nitrogen to that of old branches. The development of the new branches did not affect the growth of the old and parental branches attached. The results also indicated that energy values in roots was significantly related with plant age, however, the energy values were various in the different parts of a plant.展开更多
基金This project was partially supported by the National Natural Science Foundation of China (60273049, 90104005).
文摘A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed.
基金Projects(NZ2013303,NZ2014201)supported by the National Natural Science Foundation of ChinaProjects(51375226,51305196,51475226)supported by the Fundamental Research Funds for the Central Universities,China
文摘A new non-linear bending-torsional coupled model for double-row planetary gear set was proposed, and planet's eccentricity error, static transmission error, and time-varying meshing stiffness were taken into consideration. The solution of differential governing equation of motion is determined by applying the Fourier series method. The behaviors of dynamic load sharing characteristics affected by the system parameters including gear eccentricities error, ring gear's supporting stiffness, planet's bearing stiffness, torsional stiffness of first stage carrier and input rotation rate were investigated qualitatively and systematically, and sun gear radial orbits at first and second stage were explored as well. Some theoretical results are summarized as guidelines for further research and design of double-row planetary gear train at last.
基金supported by the National Natural Science Foundation of China (61073183)the Natural Science Foundation for the Youth of Heilongjiang Province (QC2012C070)
文摘In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.
文摘The multi-string LED in parallel is a popular structure in backlight and lighting applications.The current balancing for each string is required to achieve uniform luminance and reliable operation.The conventional active current sharing technique using a switching converter or a linear switch is very complex,and needs extra components.The conventional coupled inductor based current sharing method is much more simple,but needs too many coupled inductors.
基金This project was supported by Liuhui Applied Mathematics Center of Nankai University .
文摘A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given.
基金supported by the National Basic Research Program of China(973 Program)(2011CB302903)the Key Program of Natural Science for Universities of Jiangsu Province(10KJA510035)+2 种基金the Science and Technology Innovation Group Foundation of Jiangsu Province ("Qing and Lan" Project)the Postgraduate Innovation Project Foundation of Jiangsu Province(CX10B 194ZCX09B 152Z)
文摘Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance.
基金This project was supported by the National Natural Science Foundation of China (60172012) Hunan Provincial NaturalScience Foundation of China (03JJY3110) .
文摘The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.
基金This project was supported by Young Teacher Foundation of North China Elec. Power Univ.(200521001)
文摘To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.
基金Project(51105194)supported by the National Natural Science Foundation of ChinaProject(20113218110017)supported by the Doctoral Program Foundation of Institutions of Higher Education of China+2 种基金Project supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,ChinaProject(CXZZ11_0199)supported by the Funding of Jiangsu Innovation Program for Graduate Education,ChinaProjects(NZ2013303,NZ2014201)supported by the Fundamental Research Funds for the Central Universities,China
文摘A new nonlinear transverse-torsional coupled model with backlash and bearing clearance was proposed for planetary gear set. Meanwhile, sun gear and planet's eccentricity errors, static transmission error, and time-varying meshing stiffness were taken into consideration. The differential governing equations of motion were solved by employing variable step-size Rung-Kutta numerical integration method. The behavior of dynamic load sharing characteristics affected by the system parameters including input rate, sun gear's supporting stiffness and eccentricity error, planet's eccentricity error, sun gear's bearing clearance, backlashes of sun-planet and planet-ring meshes were investigated qualitatively and systematically. Some theoretical results are summarized at last which extend the current understanding of the dynamic load sharing behavior of planet gear train, enrich the related literature and provide references for the design of planetary gear train.
文摘The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced.
基金supported by the National Natural Science Foundation of China(6102100161133015+4 种基金61171065)the National Natural Science Foundation of China(973 Program)(2013CB329001)the National High Technology ResearchDevelopment Program(863 Program)(2013AA0106052013AA013500)
文摘Over the past few decades, the world has witnessed a rapid growth in mobile and wireless networks(MWNs) which significantly change human life. However, proliferating mobile demands lead to several intractable challenges that MWN has to face. Software-defined network is expected as a promising way for future network and has captured growing attention. Network virtualization is an essential feature in software-defined wireless network(SDWN), and it brings two new entities, physical networks and virtual networks. Accordingly, efficiently assigning spectrum resource to virtual networks is one of the fundamental problems in SDWN. Directly orienting towards the spectrum resource allocation problem, firstly, the fluctuation features of virtual network requirements in SDWN are researched, and the opportunistic spectrum sharing method is introduced to SDWN. Then, the problem is proved as NP-hardness. After that, a dynamic programming and graph theory based spectrum sharing algorithm is proposed.Simulations demonstrate that the opportunistic spectrum sharing method conspicuously improves the system performance up to around 20%–30% in SDWN, and the proposed algorithm achieves more efficient performance.
基金supported by the National Preeminent Youth Foundation(70225002)the Doctor Foundation of North China Electric Power University(200822029).
文摘A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overcomes the limitation of the static weighted secret sharing schemes that cannot change the weights in the process of carrying out and the deficiency of low efficiency of the ordinary dynamic weighted sharing schemes for its resending process. Thus, this scheme is more suitable to the case that the number of shareholders needs to be changed randomly during the scheme is carrying out.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2012R1A1A4A0105777)supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2013-H030113-4007) supervised by the NIPA (National IT Industry Promotion Agency)
文摘A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a resource) is used as an intermediate result and executed in other peers via its duplication and transmission. As the checkpoint is close to a final result, the reduction of execution time for each task becomes higher, leading to reducing turnaround time. To evaluate the performance of our scheduling scheme in terms of transmission cost and execution time, an analytical model with an embedded Markov chain is presented. We also conduct simulations with a failure rate of tasks and compare the performance of our scheduling scheme with that of the existing scheme based on client-server architecture. Performance results show that our scheduling scheme is superior to the existing scheme with respect to the reduction of execution time and turnaround time.
基金Ministry of Science and Technology "National Science and Technology Platform Program"(2005DKA31800)
文摘Scientific data refers to the data or data sets generated from scientific research process through observations, experiments, calculations and analyses. These data are fundamental components for developing new knowledge, advancing technological progress, and creating wealth. In recent years, scientific data has been attracting more and more attention for its preserving, archiving and sharing.
基金supported by Chinese society of academic degrees and graduate education:The annual developing report for reforming of Doctoral candidate training model.(project number:A2-2015Y0510-020)
文摘With the increasing globalization and international communication,numerous overseas students and visiting scholars study and exchange knowledge in Chinese universities.They confront the challenge of how to effectively deal with the knowledge sharing in a cross- cultural setting. The purpose of the study is to examine knowledge sharing in Chinese universities in the cross-communication setting. First,the concepts of cross-cultural communication and knowledge sharing are briefly introduced. The paper explores the internal and external factors affecting knowledge sharing in Chinese universities. The findings show the strategies of knowledge sharing that should be employed,including promoting mutual trust,establishing knowledge sharing culture,the incentive and rewards system and the ShareNet platform.
文摘Resource sharing in the different parts of the clonal white clover plant (Trifolium repens L.) was investigated in this study. The results showed that the integration of water and nitrogen metabolism occured among parental, young and old branches of a plant when water passed through its stolons. Under the sufficient supply of light, water and nutrients from soil the newly developed branches showed similar capacity in taking in sufficient water and nitrogen to that of old branches. The development of the new branches did not affect the growth of the old and parental branches attached. The results also indicated that energy values in roots was significantly related with plant age, however, the energy values were various in the different parts of a plant.